CVE-2024-8580

A vulnerability classified as critical was found in TOTOLINK AC1200 T8 4.1.5cu.861_B20230220. This vulnerability affects unknown code of the file /etc/shadow.sample. The manipulation leads to use of hard-coded password. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/AC1200T8/shadow.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.276814 Permissions Required
https://vuldb.com/?id.276814 Permissions Required Third Party Advisory
https://vuldb.com/?submit.401293 Third Party Advisory VDB Entry
https://www.totolink.net/ Product
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:totolink:t8_firmware:4.1.5cu.861_b20230220:*:*:*:*:*:*:*
cpe:2.3:h:totolink:t8:-:*:*:*:*:*:*:*

History

10 Sep 2024, 15:47

Type Values Removed Values Added
First Time Totolink t8
Totolink
Totolink t8 Firmware
References () https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/AC1200T8/shadow.md - () https://github.com/abcdefg-png/IoT-vulnerable/blob/main/TOTOLINK/AC1200T8/shadow.md - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.276814 - () https://vuldb.com/?ctiid.276814 - Permissions Required
References () https://vuldb.com/?id.276814 - () https://vuldb.com/?id.276814 - Permissions Required, Third Party Advisory
References () https://vuldb.com/?submit.401293 - () https://vuldb.com/?submit.401293 - Third Party Advisory, VDB Entry
References () https://www.totolink.net/ - () https://www.totolink.net/ - Product
CPE cpe:2.3:h:totolink:t8:-:*:*:*:*:*:*:*
cpe:2.3:o:totolink:t8_firmware:4.1.5cu.861_b20230220:*:*:*:*:*:*:*

09 Sep 2024, 13:03

Type Values Removed Values Added
Summary
  • (es) Se ha encontrado una vulnerabilidad clasificada como crítica en TOTOLINK AC1200 T8 4.1.5cu.861_B20230220. Esta vulnerabilidad afecta al código desconocido del archivo /etc/shadow.sample. La manipulación conduce al uso de una contraseña codificada. El ataque puede iniciarse de forma remota. La complejidad de un ataque es bastante alta. La explotación parece ser difícil. El exploit ha sido divulgado al público y puede utilizarse. Se contactó al proveedor con anticipación sobre esta divulgación pero no respondió de ninguna manera.

08 Sep 2024, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-08 21:15

Updated : 2024-09-10 15:47


NVD link : CVE-2024-8580

Mitre link : CVE-2024-8580

CVE.ORG link : CVE-2024-8580


JSON object : View

Products Affected

totolink

  • t8_firmware
  • t8
CWE
CWE-259

Use of Hard-coded Password